GHSA-h36m-2vh5-x699: Duplicate Advisory: ACPX Windows wrapper shell fallback allowed cwd injection in specific paths
(updated )
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-6f6j-wx9w-ff4j. This link is maintained to preserve external references.
Original Description
OpenClaw versions 2026.2.26 prior to 2026.3.1 on Windows contain a current working directory injection vulnerability in wrapper resolution for .cmd/.bat files that allows attackers to influence execution behavior through cwd manipulation. Remote attackers can exploit improper shell execution fallback mechanisms to achieve command execution integrity loss by controlling the current working directory during wrapper resolution.
References
Code Behaviors & Features
Detect and mitigate GHSA-h36m-2vh5-x699 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →